WO2002084970A2 - Systeme permettant un acces a distance a un systeme informatique - Google Patents

Systeme permettant un acces a distance a un systeme informatique Download PDF

Info

Publication number
WO2002084970A2
WO2002084970A2 PCT/CA2002/000471 CA0200471W WO02084970A2 WO 2002084970 A2 WO2002084970 A2 WO 2002084970A2 CA 0200471 W CA0200471 W CA 0200471W WO 02084970 A2 WO02084970 A2 WO 02084970A2
Authority
WO
WIPO (PCT)
Prior art keywords
computing system
local computing
remote
computing device
central
Prior art date
Application number
PCT/CA2002/000471
Other languages
English (en)
Other versions
WO2002084970A3 (fr
Inventor
Saurabh Abhyankar
Original Assignee
Kronofusion.Com Technologies Inc.
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Kronofusion.Com Technologies Inc. filed Critical Kronofusion.Com Technologies Inc.
Priority to AU2002249029A priority Critical patent/AU2002249029A1/en
Publication of WO2002084970A2 publication Critical patent/WO2002084970A2/fr
Publication of WO2002084970A3 publication Critical patent/WO2002084970A3/fr

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/08Protocols specially adapted for terminal emulation, e.g. Telnet
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/14Session management
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L69/00Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass
    • H04L69/30Definitions, standards or architectural aspects of layered protocol stacks
    • H04L69/32Architecture of open systems interconnection [OSI] 7-layer type protocol stacks, e.g. the interfaces between the data link level and the physical level
    • H04L69/322Intralayer communication protocols among peer entities or protocol data unit [PDU] definitions
    • H04L69/329Intralayer communication protocols among peer entities or protocol data unit [PDU] definitions in the application layer [OSI layer 7]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W92/00Interfaces specially adapted for wireless communication networks
    • H04W92/02Inter-networking arrangements

Definitions

  • the present invention pertains to the field of electronic communication systems, and more particularly, to a system and method for enabling access to the functionality of one computing system by one or more remotely located computing devices.
  • a remote computer such as mobile laptop computers
  • a user of a remote computer may use a public switched telephone network (PSTN) to establish a modem- based data link between the remote computer and an access server attached to the corporate network, with this access server providing communication with the desired local computer.
  • PSTN public switched telephone network
  • the user of a remote device can establish a PSTN connection to an access point of a public wide area network, such as the Internet, proceeding to communicate with the desired local computer through this wide area network.
  • a further system and method enabling a remote device to connect with a local computing device is described in U.S. Patent No. 5,892,432.
  • the method of creating a connection between a remote device and the base computing device commences with the remote device requesting communications with the base computing device using a wireless paging service.
  • the remote device generates a paging message that is transmitted by the wireless paging service and received by the control and activation device.
  • the control and activation device processes and interprets the paging message in order to activate the local computer.
  • the paging message includes a call-back number that is transferred from the control and activation device to the local computer.
  • the local computer dials the call-back number in order to establish a communication link with the remote device.
  • the local computer relinquishes control of the communication link to the remote device such that the information exchange can be initiated between the local computer and the remote device.
  • This technique of remote access requires an application program to be present on both the remote device and the local computing device in order to establish a communication link between said devices, thus the remote device requires minimum system requirements in order to implement this method.
  • European Patent Application No. 0972416 describes a system enabling a user wireless remote access to a variety of software functionalities residing within a local computer.
  • the remote device (user) generates control commands, which are wirelessly transmitted to a fixed radio part, which is directly connected to the local computer.
  • the fixed radio part processes the control commands and provides said commands to the local computer via a high speed serial bus.
  • An interface associated with the computer is responsive to the control commands and provides the remote • device access to the variety of software functionalities in response to the commands that have been transmitted.
  • This method of remote access of a computing device requires the direct connection of the remote device to the desired computing device. This connection is provided using a wireless link between the remote device and a radio fixed port which is in turn directly connected to the computing device in question.
  • Each of these remote access systems and methods require a direct communication link between the remote device and the local computing device and/or application software to be installed on the remote device in order to enable the remote device to access the functionalities of the local computing device.
  • This type of link may be difficult to create.
  • One reason for this could be the existence of a firewall that could prevent the connection.
  • Most standard firewalls would prevent such connections by default and, additionally, reconfiguration of the firewall to support such a remote connection would often require advanced skills on behalf of the user.
  • Another factor that could make this link difficult is the presence of a Dynamic Host Configuration Protocol (DHCP) server that dynamically allocates an IP address to the local computer on a periodic basis thus resulting in a change in the IP address of the local computer.
  • DHCP Dynamic Host Configuration Protocol
  • DHCP is an Internet protocol for automating the configuration of computers that use Transmission Control Protocol/Internet Protocol (TCP/IP).
  • TCP/IP is the method by which data on the Internet is divided into packets of bytes. Each packet is delimited with header information that includes the destination address where the packet is to be routed when it is transmitted over the Internet.
  • DHCP can be used to automatically assign IP addresses, to deliver TCP/IP stack configuration parameters such as the subnet mask and default router, and to provide other configuration information such as the addresses for printer, time and news servers.
  • DHCP is based on a client-server paradigm, in which the DHCP client, e.g. a desktop computer, contacts a DHCP server for configuration parameters.
  • the DHCP server is typically centrally located and operated by the network administrator.
  • the most important configuration parameter carried by DHCP is the IP address.
  • a computer must be initially assigned a specific IP address that is appropriate to the network to which the computer is attached, and that is not assigned to any other computer on that network. If a computer moves to a new network, it must be assigned a new IP address for that new network.
  • DHCP can be used to manage these assignments automatically. However, since DHCP causes the IP address of the local computer to change, it becomes difficult for the user to determine the IP address assigned to their local computer.
  • U.S. Patent No. 6,154,843 provides a secure remote access computing system for executing tasks on a secure private network requested by an unsecured remote computing device connected to the secure private network by way of a public communication network, without exposing any device in the secure private network other than a designated network interface device to the public communication network.
  • the network interface device dynamically generates a custom program containing the necessary network data and user interfaces and verifies the security privileges for the remote computing device, so that a remote user can define the task being executed on the private network by way of the secure network interface device surrogate.
  • a network interface device surrogate is required to be installed on each private network site which requires the capability to enable a remote computing device to access a particular computer connected to one of said private networks.
  • An object of the present invention is to provide a system enabling remote access of a computing system.
  • a system enabling a remote computing device to access the functionality of a local computing system using a public communication network, said system comprising: at least one remote computing device capable of accessing the public communication network; a central computing system having a central communications administrator installed thereon, said central computing system being capable of accessing the public communication network and a second communication network, said central communications administrator establishing a communication link between a remote computing device and a selected local computing system using said public communication network and said second communication network; at least one local computing system, each said local computing system having a unit communications manager installed thereon, said at least one local computing system being capable of accessing the second communication network, each unit communications manager maintaining communication between the central computing system and a local computing system enabling a remote computing device access to a selected local computing system thereby enabling a remote computing device to request a task be performed by the selected local computing system.
  • a method for a user of a remote computing device to access the functionality of a local computing system comprising the steps of: establishing a communication link between a remote computing device and a central communications administrator installed on a central computing system; authorising access to the central communications administrator by the user of the remote computing device; establishing a communication link between the remote computing device and a unit communications manager installed on a local computing system; authorising access to the unit communications manager by the user of the remote computing device; identifying a task to be executed by the local computing system; executing the identified task by the local computing system; and terminating the communication link between the remote computing device and the local computing system.
  • a computer program product for enabling a remote computing device to access the functionality of a local computing system
  • said computer program product comprising a computer readable storage medium including a first program and a second program, said first program including a set of instructions for: establishing a connection between a remote computing device and a local computing system through a central computing system; authorising a user to access the central computing system; and updating a list ; associating locations with particular local computing systems, thereby enabling contact of a particular local computing device by the central computing system; and said second program including a set of instructions for: translating information transmitted between a remote computing device and a local computing system; authorising a user to access a particular local computing system; and contacting, periodically, the central computing system, thereby updating a location with which the particular local computing system is associated.
  • Figure 1 illustrates a remote access system according to one embodiment of the present invention.
  • Figure 2 illustrates an overview of the operational steps for establishing remote access of local computing system by a remote computing device according to one embodiment of the present invention.
  • remote computing device is used to describe a device (e.g. cellular phone, PDA, PC) from which a director will access a local computing system within the network.
  • a device e.g. cellular phone, PDA, PC
  • directory is used to describe an individual, computer or other initiator of information transfer within the network, operating by way of a remote computing device.
  • the term "local computing system” is used to describe a computer that will be remotely accessed by a director through the Unit Communications Manager (UCM) installed on that system.
  • UCM Unit Communications Manager
  • One typical example of such a computing system is a personal computer (PC).
  • CCA Central Communications Administrator
  • UCM Unit Communications Manager
  • the term "Unit Communications Manager” is used to describe a system that is installed on each local computing system which is a member of the network of the invention.
  • the UCM manages a number of functions resulting in the safe, secure, authorized transfer of information within the network.
  • central computing system is used to describe a system of one or more computers that facilitate the communication between a local computing system and a remote computing device.
  • the "Central Communications Administrator” (CCA) is installed on the central computing system.
  • authorization code is used to describe a code that enables a local computing system to connect to the central computing system.
  • An authorization code for each local computing system associated with the network is stored on the database of the CCA.
  • the CCA uses an authorization code to authenticate the identity and authority of a local computing system thereby allowing an authorized local computing system to connect to the CCA and hence the network.
  • directory password means the personal password of a director, that is recognized by the UCM only, and used to authenticate the identity and authority of a director to use a specific local computing system, wherein the director password is stored in a secure manner on a specific local computing system.
  • This invention provides a system enabling the remote access of a computing system's functionality.
  • the network is generated by two primary systems: a Central Communications Administrator (CCA) which is installed on a central computing system and a Unit Communications Manager (UCM) which is installed on each local computing system (e.g. a personal computer).
  • CCA Central Communications Administrator
  • UCM Unit Communications Manager
  • Each UCM which is on-line, communicates with the CCA for authentication.
  • a network is generated that can be accessed by a director using a remote computing device and used to transmit tasks to be executed by the specific local computing system to which it is connected, such as the transfer of information from one computing system to another destination.
  • the remote access system can be configured as illustrated in Figure 1.
  • a director using a remote computing device 20 sends a request for remote access over a first communication network 50 to the central computing system 10.
  • the first communication network 50 can be a public communication network, for example the Internet or other network with similar communication characteristics.
  • the central computing system 10 includes the Central Communications Administrator (CCA) which facilitates the remote access connection between the remote computing device 20 and a local computing system 30.
  • Each local computing system 30 comprises a Unit Communications Manager (UCM) which manages the communication link established between a local computing system 30 and the central computing system 10 using the second communication network 60.
  • UCM Unit Communications Manager
  • the CCA operating on the central computing system 10 contacts the UCM on the selected local computing system 30 using the second communication network 60 and subsequently establishes a connection between the remote computing device 20 and the selected local computing system 30 whereby the CCA routes the information passed between the remote computing device 20 and the local computing system 30.
  • the second communication network 60 can be either a public communication network, for example the Internet or as an alternative the second communication network may be a private communication network for example a local area network (LAN).
  • the type of network acting as the second communication network can depend on, for example, the location of the central computing system or the operator of the central computing system, if the operator is for example a third party.
  • a director using the remote computing device 20 can request the particular local computing system 30 to execute desired tasks, for example information transfer or program execution.
  • Security verification exchanges may occur between the director of the remote device and the network prior to access to the CCA and/or the UCM in order to provide access protection through proper user identification procedures and possibly to limit the access to information within the local computing system.
  • the director of the remote computing device is able to instruct the local computing system to perform a number of tasks such as information exchange and application execution.
  • the local computing system, the central computing system and the remote computing device may record and store an activity log file to document the exchanges that occurred during the communication exchange.
  • the network can be accessed by a director using a remote computing device that is capable of communicating with the central computing system using means such as an on-board web-browser, WAP compatible capabilities, or digital signal communication means.
  • a director can initiate communication with a CCA and establish a connection with a local computing system.
  • the director is presented with a list of possible local computing systems'to which connection is permitted.
  • the director chooses a local computing system for which the CCA will establish a connection with the UCM managing that particular local computing system.
  • the UCM will verify the identity and authority of the director to log-on to the local computing system, after which the director will be allowed to enter into the local computing system and initiate the execution of tasks which may be performed by that local computing system.
  • the director can cause information to be sent to the remote computing device, sent to other unique computing systems, or some other destination.
  • the information is rendered secure prior to transfer by some means known in the art such as encryption.
  • the Central Communications Administrator is a system that is installed on the central computing system, the primary function of which is to provide a means for establishing a communications link between the remote computing device and a local computing system.
  • a further function of the CCA is to establish authentication of the users of the network and to provide a means for administering access to a plurality of local computing systems by a particular director.
  • the CCA also functions to authenticate local computing systems on the network through communication between the CCA and the UCM.
  • the authorization and administration of the network is provided by a collection of tables correlating the relevant information comprising director identification, authorization codes, the identity of the local computing systems which may be accessed, and the electronic addresses of the local computing systems.
  • the CCA maintains a table correlating the identity of each local computing system, which is actively connected to the network with the most current electronic addresses of each local computing system and any other information which may be considered necessary.
  • This table provides a means for the CCA to locate the local computing system to which connection is requested by a director of a remote computing device.
  • the CCA further contains a table correlating the identity associated with a director of a remote computing device with the identification of the local computing systems to which this director is permitted access.
  • the CCA maintains a database enabling the administration of the plurality of members of the network, said plurality not being limited to the members connected to the network at any given point in time.
  • This database contains information regarding each member of the network, with said information comprising user names, authorization codes, personal information of each of the users, the identification of all of the local computing systems and any other information which may be considered necessary.
  • This database is constantly updated, thus providing a means for the addition and deletion of members of the network.
  • the tables mentioned above are maintained in an encrypted format thereby possible increasing the confidentially of the information they contain.
  • the CCA further provides a means for the creation of a communication link between the remote computing device and a local computing system, upon identification of the director and subsequent selection of the specific local computing system.
  • the server based CCA merely manages a database of network users and provides a communication channel between the remote device and the UCM's, the risk of damage by unauthorized users may be diminished. Such entry may only reveal the database controls and the ability to perhaps watch the transfer of (possibly encrypted) information between the remote computing device and the local computing system. The unauthorized user should not be able to gain access to the protected information on the local computing system.
  • the central communications administrator can be software, hardware or a combination thereof. A worker skilled in the art of computer technology would understand how to construct a central communications administrator using one of these formats.
  • the Unit Communications Manager is a system that is installed on each local computing system, which is a member of the network of this invention.
  • the primary task of the UCM is to provide a means for access to a local computing system by directors using remote computing devices which are connected to the central computing system.
  • the UCM provides this ability by maintaining communications between the local computing system and the CCA on the central computing system thus enabling remote access to the local computing system by authorized directors connected to the central computing system.
  • An additional task of the UCM is to provide a means for requested tasks to be performed and to transmit the results of these tasks to the director of the remote computing device by way of the central computing system. In cases where the generated response requires translation into a format compatible with the platform of the remote computing device, said translation can be undertaken either by the UCM on the local computing system or by the CCA on the central computing system.
  • the Unit Communications Manager can comprise one or more modules which provide information relating to the creation of interfaces with the variety of remote computing devices and/or the preferred format of an interface.
  • a particular module can define the parameters for the creation of an interface with a cellular phone and a further module can define the interface for a PDA or other remote computing device.
  • the UCM can also comprise one or more modules which provide access to applications and data on the local computing system.
  • a module may enable access to the data and capabilities of OutlookTM or some other application.
  • the UCM further contacts the CCA, at predetermined intervals, indicating the electronic address of the local computing system upon which it is installed, thus providing a means for the CCA to contact the desired UCM upon request from a director of a remote computing device.
  • this procedure enables the CCA to contact a local computing device that is protected by a firewall or whose IP address is dynamically allocated using DHCP.
  • a further task of the UCM is to establish if a particular director is authorized to access the local computing system on which the UCM is installed. This authorization is enabled by the use of the director's password, which is only recognized by the UCM in question. Upon verification of said password the director is capable of accessing the full functionality of the local computing system.
  • the information, which is being transferred will be in an encrypted form.
  • SSL Secure Socket Layer
  • a Secure Socket Layer (SSL) encryption technique can be used to code the information.
  • SSL works by creating a temporary shared "master key" that lets only the computers on either end of a transmission scramble and unscramble information.
  • This encryption technique involves the creation of a master key that is used to encode and decode transmissions. For example, most master keys range from 40 to 1,024 digits long. As the number of digits in the key gets longer, the number of possible combinations increases. Therefore, the longer the key is the more secure, the transmission. However the longer the master key becomes, the computing power required for encryption and decryption increases.
  • the unit communications manager can be software, hardware or a combination thereof. A worker skilled in the art of computer technology would understand how to construct a unit communications manager using one of these formats.
  • the CCA installed on a central computing system 10, receives a request from a director using a remote computing device 30.
  • the CCA 10 requests identification information such as the director's username and uses that information to provide the director with a list of local computing systems 20 that are currently on-line, and to which that director is permitted access.
  • the director chooses a local computing system 20 and the CCA establishes contact between the director and the UCM of the selected local computing system 20 wherein the CCA routes the information transferred between the remote computing device 30 and the UCM of the selected local computing system 20.
  • the UCM requests identifying information such as the director's username and the director's password and uses that information to verify the identity and authority of the director to enter and use that local computing system 20. Once authenticated, the director accesses the local computing system 20 and directs the tasks to be performed.
  • the tasks performed upon creation of the interconnection between the remote computing device and the local computing system are related to information transfer.
  • the sequence of operational steps executed in order to enable remote access of a local computing system by a remote computing device is illustrated in Figure 2.
  • the operational steps establishing the interaction between a remote computing device, the central computing system and a local computing system is enabled by the Central Communications Administrator (CCA) and the Unit Communications Manager (UCM).
  • CCA Central Communications Administrator
  • UCM Unit Communications Manager
  • Step 110 a director locates a remote computing device (Step 110), which can be a cellular phone, personal digital assistant (PDA) or a personal computer for example, or any other device which is capable of communication on a public communication network, like the Internet, for example.
  • a remote computing device can be a cellular phone, personal digital assistant (PDA) or a personal computer for example, or any other device which is capable of communication on a public communication network, like the Internet, for example.
  • Step 120 Communication between the remote computing device and the Central Communication Administrator (CCA) is subsequently established (Step 120).
  • This communication can be performed over a public coirimunication network, for example the Internet.
  • the director transmits identification information to the CCA (Step 130), in order to establish the identity of the director on the network.
  • the director may be required to transmit additional identification information to the CCA for authorization.
  • This additional authorization can be performed in a number of different manners for example a password or biometric scan or any other security protocol as would be known to a worker skilled in the art.
  • the CCA Upon identification or authorization of the director, the CCA generates a list of local computing systems which can be accessed by the director and which are network active (Step 140).
  • a local computing device is network active if it has been actively updating its virtual location on the network, which can be established using an IP address, for example, and has been authorized to access the network by the CCA. From this list of potential local computing systems the director selects the local computing system with which remote access is required (Step 150).
  • the CCA establishes a communication link between the remote computing device and the Unit Communications Manager (UCM) of the desired local computing system (Step 160) via the CCA of the central computing system.
  • the UCM of the selected local computing system requests authentication of the director (Step 170) in the form of a password or other identification means as would be known to a worker skilled in the art, prior to the director being provided with access to the functionality of the selected local computing system. In this manner, authorization is required prior to granting a director access to a particular local computing system.
  • a user of a particular local computing system may wish to provide remote access to the particular local computing system by a number of directors without the requirement of prior authorization.
  • the user may configure the UCM to provide access to certain (or all) capabilities of the particular local computing system without authorization.
  • the UCM subsequently generates an appropriate interface for the transmission of information to the remote computing device (Step 180).
  • This interface is dependent on the operating system of the remote computing device or the required display format to be used for the information, for example.
  • the CCA generates an appropriate interface for the transmission of information to the remote computing device (Step 180).
  • the UCM transmits the required specifications of the appropriate interface of the remote computing device to the CCA using the established communication link between the UCM of the selected local computing system and the CCA of the central computing system.
  • Step 190 the director identifies the task which is to be performed by the specific local computing system, using the remote computing device and these instructions are subsequently transmitted to the UCM of the specific local computing device.
  • the UCM proceeds to execute the desired instructions (Step 200) on the specific computing device. These instructions may entail the transmission of information from one site to another or the execution of a particular program, for example.
  • the UCM proceeds to send information to the remote computing device (Step 210) by way of the central computing system, wherein this information may be a confirmation of the execution of the task or the results of the task, for example.
  • said translation can be undertaken either by the UCM on the local computing system or by the CCA on the central computing system.
  • the remote computing device subsequently disconnects the link between itself and the specific local computing system (Step 220).
  • the communication between a remote computing device and a local computing system can be performed without the interruption of the tasks being performed by the local computing system being accessed.
  • multiple remote computing devices can access the same local computing system at the same time, thereby producing a "many to one" relationship between the remote computing devices and a specific local computing system.

Abstract

L'invention concerne un système permettant d'accéder à distance à une fonction d'un système informatique. Le réseau est généré par deux systèmes principaux: un administrateur de communication central (CCA) installé sur un système informatique central et un gestionnaire de communication d'unité (UCM) installé sur chaque système informatique local (par ex., un ordinateur personnel). Chaque UCM en ligne communique avec le CCA en vue de générer un réseau accessible pour un élément directeur au moyen d'un dispositif informatique distant, ce réseau servant à transmettre des tâches à exécuter par le système informatique local spécifique auquel il est connecté, et notamment le transfert d'informations entre un système informatique et une autre destination.
PCT/CA2002/000471 2001-04-10 2002-04-10 Systeme permettant un acces a distance a un systeme informatique WO2002084970A2 (fr)

Priority Applications (1)

Application Number Priority Date Filing Date Title
AU2002249029A AU2002249029A1 (en) 2001-04-10 2002-04-10 System enabling remote access of a computing system

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CA2343618 2001-04-10
CA2,343,618 2001-04-10

Publications (2)

Publication Number Publication Date
WO2002084970A2 true WO2002084970A2 (fr) 2002-10-24
WO2002084970A3 WO2002084970A3 (fr) 2003-04-17

Family

ID=4168799

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CA2002/000471 WO2002084970A2 (fr) 2001-04-10 2002-04-10 Systeme permettant un acces a distance a un systeme informatique

Country Status (2)

Country Link
AU (1) AU2002249029A1 (fr)
WO (1) WO2002084970A2 (fr)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2014180417A1 (fr) * 2013-10-08 2014-11-13 中兴通讯股份有限公司 Procédé de migration de tâche et contrôleur de réseau

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO1998053581A1 (fr) * 1997-05-19 1998-11-26 Coactive Networks, Inc. Systeme serveur et procede permettant de connecter des reseaux de commande et des dispositifs a entree/sortie directes par l'intermediaire du world wide web
US5961594A (en) * 1996-09-26 1999-10-05 International Business Machines Corporation Remote node maintenance and management method and system in communication networks using multiprotocol agents
US6154843A (en) * 1997-03-21 2000-11-28 Microsoft Corporation Secure remote access computing system
DE19964186A1 (de) * 1999-01-13 2001-01-25 Tobias Kramer Verfahren zum Fernzugriff auf einen Zielcomputer, und zentraler Computer zum Durchführen eines Fernzugriffsverfahrens

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5961594A (en) * 1996-09-26 1999-10-05 International Business Machines Corporation Remote node maintenance and management method and system in communication networks using multiprotocol agents
US6154843A (en) * 1997-03-21 2000-11-28 Microsoft Corporation Secure remote access computing system
WO1998053581A1 (fr) * 1997-05-19 1998-11-26 Coactive Networks, Inc. Systeme serveur et procede permettant de connecter des reseaux de commande et des dispositifs a entree/sortie directes par l'intermediaire du world wide web
DE19964186A1 (de) * 1999-01-13 2001-01-25 Tobias Kramer Verfahren zum Fernzugriff auf einen Zielcomputer, und zentraler Computer zum Durchführen eines Fernzugriffsverfahrens

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2014180417A1 (fr) * 2013-10-08 2014-11-13 中兴通讯股份有限公司 Procédé de migration de tâche et contrôleur de réseau

Also Published As

Publication number Publication date
AU2002249029A1 (en) 2002-10-28
WO2002084970A3 (fr) 2003-04-17

Similar Documents

Publication Publication Date Title
EP1834465B1 (fr) Systeme d'acces a distance et procede permettant a l'utilisateur d'acceder a distance a un equipement terminal a partir d'une borne d'abonne
EP1311930B1 (fr) Système et procédé permettant d'authentifier un utilisateur à un serveur web
US8041815B2 (en) Systems and methods for managing network connectivity for mobile users
EP1042744B1 (fr) Télécommunications comportant un contrôle d'acces à distance
US20100197293A1 (en) Remote computer access authentication using a mobile device
US7082535B1 (en) System and method of controlling access by a wireless client to a network that utilizes a challenge/handshake authentication protocol
CN101277308B (zh) 一种隔离内外网络的方法、认证服务器及接入交换机
JP5813790B2 (ja) 分散型無線ネットワークサービスを提供するための方法およびシステム
US6785729B1 (en) System and method for authorizing a network user as entitled to access a computing node wherein authenticated certificate received from the user is mapped into the user identification and the user is presented with the opprtunity to logon to the computing node only after the verification is successful
US9344417B2 (en) Authentication method and system
US7895334B1 (en) Remote access communication architecture apparatus and method
US20020152377A1 (en) System console device authentication in a network environment
KR20080053298A (ko) 접속 프로세스의 비교적 초기에 인증함으로써 시큐어접속을 생성하는 방법 및 그 방법을 수행하게 하는 컴퓨터실행가능 명령어를 갖는 컴퓨터 프로그램 제품
CN101488857B (zh) 认证服务虚拟化
WO2003107602A1 (fr) Securite de reseau
JP2008263445A (ja) 接続設定システム、認証装置、無線端末、及び接続設定方法
JP2009277024A (ja) 接続制御方法、通信システムおよび端末
KR100777537B1 (ko) 분산 네트워크 시스템의 통합관리를 위한 플랫폼 시스템및 통합관리 방법
WO2002084970A2 (fr) Systeme permettant un acces a distance a un systeme informatique
KR100538924B1 (ko) 개인 컴퓨터를 서비스 서버로 구동한 다수의 서버/클라이언트들 구조를 이용한 피어투피어 방식의 웹 서비스, 원격 스토리지 서비스, 원격 제어 서비스 제공방법
JP2001282667A (ja) 認証サーバ・クライアントシステム
KR20040090220A (ko) 인증을 위한 네트워크 장치와 시스템 및 상기 장치를이용한 네트워크 장치 인증방법
RU2008109223A (ru) Обеспечение согласованного прохода брандмауэра, имеющего информацию о приложении
KR20100063886A (ko) 이종 네트워크 간의 원격 접속 제어 시스템 및 방법
JP4878043B2 (ja) アクセス制御システム、接続制御装置および接続制御方法

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A2

Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BY BZ CA CH CN CO CR CU CZ DE DK DM DZ EC EE ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NO NZ OM PH PL PT RO RU SD SE SG SI SK SL TJ TM TN TR TT TZ UA UG US UZ VN YU ZA ZM ZW

AL Designated countries for regional patents

Kind code of ref document: A2

Designated state(s): GH GM KE LS MW MZ SD SL SZ TZ UG ZM ZW AM AZ BY KG KZ MD RU TJ TM AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE TR BF BJ CF CG CI CM GA GN GQ GW ML MR NE SN TD TG

121 Ep: the epo has been informed by wipo that ep was designated in this application
REG Reference to national code

Ref country code: DE

Ref legal event code: 8642

122 Ep: pct application non-entry in european phase
NENP Non-entry into the national phase

Ref country code: JP

WWW Wipo information: withdrawn in national office

Country of ref document: JP